The vulnerability is a stored Cross-Site Scripting (XSS) issue within the Rich Text fields of NocoDB. The root cause of this vulnerability lies in the backend's failure to sanitize user-provided HTML before storing it. The commit c4fcf94c20d6097b2ff6cec1f1aae2caca2c7d0f directly addresses this by introducing server-side sanitization. The analysis of this commit reveals that the CommentsService was responsible for handling the creation and updates of comments, which are a form of rich text. The create and update methods within this service were accepting raw HTML content and persisting it to the database without any sanitization. This allowed an authenticated user with an 'Editor' role to inject malicious scripts. The patch rectifies this by employing DOMPurify to sanitize the content on the server-side before it is stored, thus preventing the stored XSS vulnerability. While the frontend rendering was also made safer by replacing v-html with v-dompurify-html as a defense-in-depth measure, the primary vulnerability was the lack of input sanitization in the backend services.